Discover and read the best of Twitter Threads about #Password

Most recents (23)

🔒 Understanding Zero Knowledge Proofs: A thread

🤔 Have you ever wondered how you can prove you know something without revealing any information about it? This is where zero-knowledge proofs come into play!

Continue reading👇👇👇 Zero knowledge proofs
1️⃣ Zero-knowledge proofs are a type of #cryptographic protocol that allows you to prove knowledge of something without actually revealing the info itself.

This is done by using complex mathematical #algorithms to check the validity of a claim without learning about its info.
2️⃣ One common use case for zero-knowledge proofs is in password authentication.

Instead of sending your actual #password to a server, which could be intercepted by an attacker, a zero-knowledge proof can be used to prove that you know your password without revealing what it is.
Read 7 tweets
🎙️Web3 Security Q&A with our CEO Rick Deacon - @rickdeaconx

⚠️Part I: Common #Web3 Threats

(Part II: How Interlock solves this by using #AI - will be published tomorrow!)

🧵👇
Q: What are the top security problems for crypto and Web3 users right now?

A: "The most prevalent security problems are all focused on social engineering:

1⃣Phishing attacks where attackers try to steal personal information by disguising a malicious website as a legitimate one.
2⃣Malware infections which can steal personal information, funds or take control of a device.

3⃣Scams that take advantage of the hype around #cryptocurrency and Web3 technologies to trick users into sending money or personal information.
Read 18 tweets
I've been toying with a method for people to keep credentials memorable while keeping them completely unique on each & every site 👍

This method uses SHA256 encoding to generate username & password based on memorable secret & format, but input username & password is gibberish 😎
Just come up with a phrase you can easily remember like "i<3vaginas" then use URL itself as prefix to username & password.

User: gmail.com_barnacules
Pass: gmail.com_password

Then use encoded text as actual username & password for each site 👍
(Example. someguy@gmail.com)
user: gmail.com_someguy
pass: gmail.com_someguy_password
secret: i<3vaginas
siteuser: 9a4315f777adaa6899aa2c519641697025c74dbf9728005a
sitepass: 9a4315f777adaa6899aa2c519641697025c74dbf9728070155705752c76f566fa31c75a2
🤔
Read 6 tweets
🧵Let's talk about #Telegram - here are ten useful cybersecurity groups and channels we watch:

A thread:
1. Cyber Security News (30k+ members)

Cyber Security News is a feed channel for links to breaking news stories across the internet, everything from #TechCrunch to #Portswigger. It’s a one-stop shop for cyber-related news with your morning coffee.

telegram.me/cyber_security…
2. Cyber Security Experts (23k+ members)
A great channel for exchanging #information about #cyber, #IT, and #security. Mainly used to get answers to questions and help other security experts to enhance their security maturity.

t.me/cybersecuritye…
Read 13 tweets
This is your forewarning. #TikTok has reportedly suffered a #data #breach, and if true there may be fallout from it in the coming days. We recommend you change your TikTok #password and enable Two-Factor Authentication, if you have not done so already.
The types of information accessible haven’t been confirmed.

A security team *has* claimed responsibility, but are currently working privately so we’ll hold off on the disclosure without a go-ahead.

#CyberSecurity #databreach #social #tiktok #security #cyberattack
Checked, they’re no longer private. Researcher Credit @AggressiveCurl 🫡
Read 3 tweets
Airdrop

When #cryptocurrency projects distribute their native #tokens straight to their customers' wallets.

[#web3 glossary thread]
Alpha

Important or insider knowledge, notably about the value of #digital assets such as #cryptocurrencies and #NFTs; a measure of an investment's return over and above that of the market or other benchmark.

[#web3 glossary thread]
Altcoin

Formerly used to describe any #cryptocurrency that wasn't #Bitcoin; however, #altcoin is now used to describe any new cryptocurrency with a low market valuation.

[#web3 glossary thread]
Read 102 tweets
Today I learned about the #Plex (@plex) breach via my work internal off-topic chat and was linked to a @TheVerge article that said an email was sent out. Turns out my spam filter got it 😞 🧵
One thing of note in the article is the advice that is reported and the device of the advice is terrible. They do not recommend you change your password because it's encrypted and then stated it is hashed, these are two different things.
Hashes generally are not reversible, however, this is a bit untrue since you can re-run the hashing technique via brute force and dictionary attacks. You can make these very hard by salting the data (this was the problem with #AshleyMadison they didn't salt their hashes.
Read 11 tweets
Since your malicious cyberattack timelines matched cybersecurity’s research to strengthen security for years and now, you hack alone but with a cooperative goal to damage national security. Which Advanced Persistent Threats group/s #APTs are you in, #Animez_UK? Image
Converting traditional crime to cyber-enabled crime and becomes a malicious attacker against the UK, for

1- financial income,
2- #sexual desire and #harassment with #pornography sent to #women,
3- attacks for #politics against the UKGOV.

#Animez_UK ImageImage
1st stage- early life:
-Experienced #exclusion/#discrimination.
-Didn’t learn to communicate with #women.
-favours #authoritarianism.
-enjoys #control targeted women & whom against his will.
- Expresses hidden #hatred & #violence on through cyberattacks.

#Animez_UK ImageImage
Read 214 tweets
Having fun with cyberstalking #UKGOV, attacking organisations, universities & individuals connected to the justice system, UK #military against #NCSC, treating #intelligence & #GCHQ as jokes to your 15- 20 yrs malicious #hacking for #China & #Russia inside #Britain, @Animez_UK?01
Converting #traditional crime to cyber-enabled crime and becomes a malicious #cyberattacker against the UK, for

1- #financial income,
2- #sexual desire and #harassment with #pornography sent to #women,
3- attacks for #politics against the #UKGOV.

@Animez_UK @NCSC

02 Image
1st stage- early life:
-Experienced #exclusion/#discrimination.
-Didn’t learned to communicate with #women.
-favours #authoritarianism.
-enjoys to #control targeted women & whom against his will.
- Expresses hidden #hatred & #violence on through cyberattacks.

@Animez_UK @NCSC Image
Read 188 tweets
We’ve brought you 8 #meetups from last month to freshen up your knowledge in React a little.
Bury yourself in these #tech talks and learn about the most recent updates and methods in #React from experts all over the world.

blog.meetupfeed.io/react-tech-tal…
The Worlds Most Expensive React Component via @chantastic
We need to stop building expensive #React #components — components that promise the world but are impossible to maintain. Watch this video for a more productive way of working in React.

meetupfeed.io/talk/the-world…
The Stack of the Future via @kentcdodds
In this talk, Kent shows you how #Remix can help you get started with a solid foundation so you can focus on building out your ideas.

meetupfeed.io/talk/kent-c-do…
Read 10 tweets
#PrivacyResearchDay C'est parti ! La CNIL accueille aujourd'hui des chercheurs internationaux pour présenter leurs travaux sur la #vieprivée et la protection des #données.
Suivez l'événement en direct en 🇬🇧 ou en 🇫🇷👉 cnil.fr/fr/privacy-res…
Suivez le thread ⬇️
La présidente de la CNIL Marie-Laure Denis accueille la communauté internationale au 1er #PrivacyResearchDay ! Des chercheurs qui travaillent et enseignent en Allemagne, Belgique, Espagne, Singapour, Suisse, Royaume-Uni, Luxembourg et France.
La CNIL utilise la #recherche de multiples façons :
👉 Lors de la rédaction de recommandations et de lignes directrices.
👉 Dans l'un des cas sur les #cookies, la CNIL s'est référée aux résultats de deux documents de recherche.
Read 69 tweets
It’s #WorldPasswordDay – but instead of tips to improve #password use, let’s talk about the future of #passwordless… 🧵👇
We published our vision for a #passwordless future with multi-device FIDO credentials (also referred to by some as “#passkeys”) in March 🧵… fidoalliance.org/charting-an-ac…
Today, we are excited to share that @Apple @Google @Microsoft are aligned with this vision and will be implementing multi-device FIDO credentials over the course of the coming year! 🧵…
​​fidoalliance.org/world-password…
Read 6 tweets
#MetaMask will also show you a short video about a recovery phrase, do not skip it because that phrase will become a key to your account.

As soon as you are done with creating your #password and personal recovery phrase, just click “confirm” and voila, you are a newly-minted
git.kemkes.go.id/purbatandjung/… member of a huge MetaMask community, on a mission to make the world a better place with the help of blockchain technology. Now you can buy, send, or swap ETH, in other words, enjoy transactions based on consent, privacy, and free association,
faithlife.com/posts/4275376 at the same time controlling all interactions and being the one who decides what information to share and what to keep for yourself. As for making deposits at online casinos, the procedure may vary slightly from one website to another, however, usually,
Read 7 tweets
Yeah great your PIN is a keyboard walk, but mine sounds way better! This is the top 20 from the Amitay 4-digit PIN dataset. Audio 🔊 on 👂

Got nerd sniped by this:
#PIN #Password #DTMF
While we are at it, these most common words you can create from PINs. Image
... and if you observe hundreds of people entering their PIN the heatmap would look like this.

Interested? Learn more:
dl.acm.org/doi/pdf/10.114… Image
Read 4 tweets
the document is stored in your #Password protected casino folder where no one else can be granted access to the information that would allow them to use your casino accounts. As an added precaution, you can also password protect the document itself.
codecorps.godaddysites.com/f/thai-flower-… Keeping all of your casino related information and casino software downloads in one location will help ensure that your online casino gaming experiences will remain a positive experience through safety and security.
abyssinian-plume-methane.glitch.me While going to such lengths to keep your casino information safe, may seem extreme, it’s better than dealing with any legal or financial implications should someone else gain access to your account and gamble using your casino login information.
Read 7 tweets
#buildinpublic #automation #startups

At the request of @alistairswilson, here is my present #OpenSource Tech Stack!

Many of these are #Nocode/#Lowcode tools that make your life a lot easier.

So grab a cup of coffee & settle into:

Top 20 Solutions in My Tech Stack
🧵 👇
1. n8n (#Automation)
What it is: Connects different systems together and automates the tasks.

How I use it: How don't I use it?! Automated emails. Hardware Endpoint. API creation. System monitor.

Twitter: @n8n_io
Website: n8n.io
2. Bitwarden (#Password Safe, #Security)
What it is: Safely stores & remembers your passwords so you don't have to.

How I use it: I have over 2000 username & password pairs. This remembers the very long passwords I create!

Twitter: @Bitwarden
Website: bitwarden.com
Read 22 tweets
🧵 Useful Websites

1⃣ Check if your email/ phone number is in a data breach
haveibeenpwned.com

If yes, change your password immediately
#password #cybercrime
2⃣ Check the SMS Header of text message received on your phone

smsheader.trai.gov.in

#Phishing
3⃣ To know how many SIM cards are purchased in your name;

Click here

tafcop.dgtelecom.gov.in

#FakeSimCards
Read 5 tweets
There is going to be A few earth Quakes coming, band TOGETHER & do NOT let go of each others hands .. DO NOT look back .. Keep lending A hand to the ones that are/Will be in need of help ..

PLEASE, Be careful WHO you are donating too.. Evil KNOWS that ALL the money is being
not only WATCHED but FOLLOWED.. Evil will take advantage of ANY & EVERY opportunity THEY can to gain clean money to pay others to do THEIR dirty deeds. DO NOT continue being ones who fund your own demise..
I Am ALL FOR Charity & donating to Charities, ALL I AM SAYING IS watch
out for the scam artists, it's somewhat easy to see them for the most part. Keep those eyes open, if you SEE SOMETHING, SAY SOMETHING..

Keep doing your own research & THINKing for yourself ..
Read 5 tweets
Tokopedia leaked the database THREAD!!!

Semua bermula dari twit ini, ane dan temen ane lgsung cari2 kejelasan infonya dan cek ke forumnya langsung, dan ternyata sang 'actor' menjual file yg berisikan database yg leaked (15jt data) itu seharga 10EUR
dan ywda krna dihantui oleh rasa penasaran ya akhirnya kami putuskan utk membeli filenya (besar filenya 4gb stelah diesktrak) dan itu contoh SS-an versi kami *maaf ada sensor)
ehhh ternyata beberapa jam kemudian si "actor" jualan lagi file lanjutannya yg berisi data lengkapnya (91jt data user) seharga 5K USD dan dijual di Deepweb pastinya dan kami pun ya iseng coba cek dan ternyata bener *maaf beberapa info disensor
Read 17 tweets
9 EASY STEPS 📌

you should be taking right now to protect yourself, your accounts and your privacy against #phishing attacks.

#Thread 👇 (1/14)
We’re all living with extra precautions due to the reality of #COVID19 but, unfortunately, that’s not the only threat we’re dealing with.

Cybercrimes are occurring more frequently in the past few weeks, so we’re sharing a list of precautions you all should follow.

(2/14)
If these feel pretty obvious to you — AWESOME! 🤩 But it might be a good time to remind your family and friends to be careful.

(3/14)
Read 14 tweets
Vamos a usar este tweet para publicar #Dorks de todo tipo, empecemos con este:

inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner -foro -forum -topic -blog -about -docs -articles

#CyberSecurity #dork #BugBounty
intext:"pass" ! "usuario" | "user" | "contraseña" filetype:sql -github
Este es muy bueno, nos permite hacer uploads, ha sido probado con imágenes .jpeg

intitle:"FCKeditor - Uploaders Tests"
Read 63 tweets
🔴⏬ Here I start a thread about some Oracle Database concepts. We will see how far it goes - all questions/comments welcome.
🔴⏬ A database (or DBMS - database management system) stores (for short and long term) and manipulates (from many concurrent users/devices) your #data.
🔴⏬ #data is logically structured (tablespaces, schemas, tables, columns, datatypes, constraints,…). The structure is described by #metadata.
Read 73 tweets
Daily #GDPR fail, from #Milan County, restricted traffic zone website.

text #password stored in database
sending readable password in email
showing password on web pages with silly bullets (easy to hack)
16 digits Max for passwords
no gdpr #compliance on website ImageImageImage
in the database there are:

- plates of my cars
- my transits in every restricted traffic area gate
- the exact time of my transits
- so many more data

...somebody can easily track my usual routes, my habits, my work...

I suppose the #DPO is on holiday.

This is crazy.
DPO is not on holiday.
Somebody will take care. Image
Read 3 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!